CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

enterprise management system

Results 1 - 25 of 181Sort Results By: Published Date | Title | Company Name
Published By: Intel     Published Date: Nov 13, 2019
The combination of the SAP HANA platform and Intel® Optane™ DC persistent memory means that enterprises now have new ways to approach data tiering and management. Downtime can be significantly reduced because SAP HANA doesn’t have to reload data back into main memory after a server reboot, and more data can remain in the “hot” tier of main memory, which increases the amount of data that can be analyzed at a time. See this new infographic for a quick summary. Intel® Optane™ DC persistent memory also benefits SAP HANA by providing a higher memory density than DRAM, in addition to being byte-addressable. Up to three terabytes of Intel® Optane™ DC persistent memory is available per CPU socket on systems configured with future Intel® Xeon® Gold processors and future Intel® Xeon® Platinum processors, which means that an eight-socket server can contain up to 24 terabytes of Intel® Optane™ DC persistent memory.
Tags : 
    
Intel
Published By: BehavioSec     Published Date: Oct 04, 2019
A Global 2000 bank was evaluating new methods of authentication for their digital clients to protect accounts under constant attack by malware and fraudsters. In evaluating behavior biometric vendors, they selected BehavioSec, for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
A well-known global bank was evaluating new ways of strengthening authentication for their High-Net-Worth Individuals (HNWI) to protect their high value accounts. These accounts are under constant attack by sophisticated, targeted fraud attempts. In evaluating behavioral biometric vendors, the bank selected BehavioSec, because of its accuracy and enterprise grade capabilities, to be deployed on-premise and to integrate with its existing security and risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
A consortium of Global 2000 companies founded a joint authentication service provider to keep up with innovation at competitive Fintech companies. The new provider developed a mobile authentication app to maintain a high degree of mobile security without losing customers to UX-focused Fintech companies. As peer-to-peer (P2P) transactions grew rapidly, so did the false rejections and need for manual review. In evaluating security vendors for a more cohesive and frictionless solution, the provider selected BehavioSec for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : 
cloud computing, technology, virtela, device management, christian kane, mobility management, research
    
Virtela Communications, Inc.
Published By: ASG Software Solutions     Published Date: Aug 08, 2008
Business runs on content and that content must be managed holistically, across the entire business. However, managing content is, in itself, not enough to drive business. Enterprises must incorporate ECM with other IT management systems to provide complete Business Service Management (BSM).
Tags : 
asg, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Feb 24, 2010
A recent survey of CIOs found that over 75% want to develop an overall information strategy in the next three years, yet over 85% are not close to implementing an enterprise-wide content management strategy. Meanwhile, data runs rampant, slows systems, and impacts performance. Hard-copy documents multiply, become damaged, or simply disappear.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap, ilm, mobius, workload automation, wla, visibility, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce
    
ASG Software Solutions
Published By: Dell EMC     Published Date: Sep 12, 2016
VCE pioneered Converged Infrastructure with the introduction of Vblock® Systems in 2009, and today we’ve helped more than 1,200 global enterprise customers transform their IT environments to become more agile, reliable, and cost-effective. Dell EMC brings together best-of-breed technologies in converged Vblock Systems and VxBlock™ Systems solutions to power data centers and simplify management and operations throughout the system life cycle.
Tags : 
    
Dell EMC
Published By: Pega     Published Date: May 25, 2016
Organizations are constantly turning to IT solutions to streamline their operations and processes and gain efficiencies. Business Process Management solutions is one area gaining traction inside enterprises as they look to making their workflow more effective and more capable to an ever changing business environment. According to Gartner, BPM-platform-based case management frameworks are configurable "apps" meant to help solution architects accelerate the delivery of unique and flexible case management solutions. Gartner evaluated 11 providers in this growing market segment including Pegasystems. Download this Gartner Magic Quadrant analysis for BPM platform-based case management frameworks and gain a better understanding of the solutions offered by each BPM vendor.
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, solutions
    
Pega
Published By: Pega     Published Date: May 25, 2016
Adapting to changing market dynamics is not easy for any enterprise-class organization. To stay competitive, companies not only must adapt different go to market and customer service strategies but also embrace internal business process and workflow changes, which in many cases can be more difficult. Enter Intelligent Business Process Management Suites (iBPMS). According to Gartner, iBPMS compress the observation-to-action-to-outcome cycle, and help business transformation leaders, business process directors and solution architects establish a fluid capability to handle big change. Gartner evaluated 15 iBPMS vendors including Pegasystems. Download this Gartner Magic Quadrant analysis and gain a better understanding evolving iBPMS market and the solutions offered by each iBPMS vendor.
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, solutions, enterprise management
    
Pega
Published By: Pega     Published Date: May 25, 2016
Customer insights professionals face the challenging task of delivering contextually relevant experiences across the customer life cycle. They need to work with their business technology counterparts to integrate enterprise marketing technologies that manage customer data, provide real-time analytics and insights, and automate cross-channel interactions. Here is where Real-Time Interaction Management (RTIM) is critical, according to The Forrester Wave™: Real-Time Interaction Management, Q3 2015 report, which identified the 11 most significant technology providers in this space across 35 criteria. Forrester defines RTIM as “Enterprise marketing technology that delivers contextually relevant experiences, value, and utility at the appropriate moment in the customer life cycle via preferred customer touchpoints,” and identifies Pegasystems as one a leader in this very diversified pack. Download this Forrester Wave report to
Tags : 
interaction management, business technology, enterprise, forrester, best practices, pegasystems, open source, software outsourcing, productivity
    
Pega
Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware
Published By: MobileIron     Published Date: Apr 20, 2015
This eBook is designed to help your organization anticipate, understand and manage these and other questions regarding BYOD in the enterprise. In this four-part guide, we’ll look at best practices for preparing, building, rolling out and sustaining a successful BYOD program over the long term. (This guide is written in Japanese)
Tags : 
enterprise, management, mobility, workforce, operating system, device, productivity
    
MobileIron
Published By: MobileIron     Published Date: Apr 20, 2015
As mobile users increasingly demand the ability to use their own devices for everything personal and work-related, IT is quickly losing control over end-user technology decisions. Enterprises can no longer ignore this reality, especially given the explosive global demand for mobile devices. (Guide written in Japanese)
Tags : 
enterprise, management, mobility, workforce, operating system, device, productivity
    
MobileIron
Published By: MobileIron     Published Date: Apr 15, 2015
This eBook is designed to help your organization anticipate, understand and manage these and other questions regarding BYOD in the enterprise. In this four-part guide, we’ll look at best practices for preparing, building, rolling out and sustaining a successful BYOD program over the long term.
Tags : 
enterprise, management, mobility, workforce, operating system, device, productivity
    
MobileIron
Published By: MobileIron     Published Date: Apr 15, 2015
In addition to describing how EMM works, this guide also illustrates a typical implementation journey that explains how an organization goes about deploying and managing all the pieces of an EMM to transform business processes.
Tags : 
enterprise, management, mobility, workforce, operating system, device, productivity
    
MobileIron
Published By: Pega     Published Date: Jun 21, 2016
Organizations are constantly turning to IT solutions to streamline their operations and processes and gain efficiencies. Business Process Management solutions is one area gaining traction inside enterprises as they look to making their workflow more effective and more capable to an ever changing business environment. According to Gartner, BPM-platform-based case management frameworks are configurable "apps" meant to help solution architects accelerate the delivery of unique and flexible case management solutions. Gartner evaluated 11 providers in this growing market segment including Pegasystems.
Tags : 
    
Pega
Published By: Pega     Published Date: Jul 29, 2015
Customer insights professionals face the challenging task of delivering contextually relevant experiences across the customer life cycle. They need to work with their business technology counterparts to integrate enterprise marketing technologies that manage customer data, provide real-time analytics and insights, and automate cross-channel interactions. Here is where Real-Time Interaction Management (RTIM) is critical, according to The Forrester Wave™: Real-Time Interaction Management, Q3 2015 report, which identified the 11 most significant technology providers in this space across 35 criteria. Forrester defines RTIM as “Enterprise marketing technology that delivers contextually relevant experiences, value, and utility at the appropriate moment in the customer life cycle via preferred customer touchpoints,” and identifies Pegasystems as one a leader in this very diversified pack. Download this Forrester Wave report to discover how well each vendor fulfills Forrester’s criteria an
Tags : 
    
Pega
Published By: Sage EMEA     Published Date: Jan 29, 2019
Ready to work faster, simpler, and more flexibly? Now you can. With today’s technology advancements, there’s no need to settle for less when it comes to your enterprise management solution. And now, with the introduction of Sage Business Cloud, you can future-proof your business with the only management solution you’ll ever need. Sage Business Cloud enables you to come onto the platform at any stage of your business and allows you to grow over time by adding new products as you need them. These include core cloud products across accounting, financials, enterprise management, and HR, as well as a thriving ecosystem that draws from more than 200 ISVs. Request a business review and discover how the right enterprise management solution can help you manage growth, improve efficiency, make smarter decisions, and reduce IT cost and complexity.
Tags : 
    
Sage EMEA
Published By: Akamai Technologies     Published Date: Jul 02, 2019
In today’s markets, customer identities and the personal data associated with them are among the most critical and valuable assets of any enterprise. Managing these digital identities — from first registration and login to the later stages of the customer relationship — and extracting business value from the associated data are complex tasks, commonly referred to as customer identity and access management (CIAM). When implementing a system to collect, manage, and utilize digital identity and customer data, companies have two basic choices: in-house development or buying a dedicated solution from a vendor specialized in CIAM (i.e., build vs. buy). Read this white paper for an in-depth analysis of CIAM implementation options, including: ? Must-haves for a successful, enterprise-grade CIAM system ? Pros and cons of implementation options, ranging from in-house software development to commercial off-the-shelf solutions ? A real-world case study that illustrates the ROI of an effective CI
Tags : 
    
Akamai Technologies
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search